General
-
Target
e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.zip
-
Size
474KB
-
Sample
230530-lcsp7aha5z
-
MD5
7f9adcb688c6cf5c1910a6a8bc5cee14
-
SHA1
c598ca1d1556b9691b4096b865662fba03ad0fdb
-
SHA256
a77e709b70ec46539ce939b203e698593d36c1db045c878f86aeecdd37286830
-
SHA512
bd7f47c700cf8584b59e20f977769abd689cacd3855c55c072cdf77743f4ff559a0a678a18a8e3a75d95e3f523ef3fbe0f25f7e813d8a9655193dc7845912674
-
SSDEEP
12288:QAW4BzIwKJzbjoTUmZVa+sMn7dBcR9DZecLRyo56zxj79:RW4Z5mzbjyXPa+r7dUx3LRst79
Malware Config
Extracted
limerat
1LLUV51XQKqq94X965Cc6uGPXeZEGSqCdV
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/4pByu6u5
-
delay
3
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Targets
-
-
Target
e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c.exe
-
Size
781KB
-
MD5
5ddfbddf74d9e09bf434940362019979
-
SHA1
595d69d9fc35b83cd8d6567e88ab6526582576e4
-
SHA256
e615a06c4539fc5fabedd46658fdc2ff534d0173f9043162f3809ef3002f0a2c
-
SHA512
6fcf4f5c573986cf5ae881812bf692a4d76683d636e4a7211111fc37f11e7ac8998dc98177b3efbbbf36ffd61346fa0aa5853231ee8337816ab7585ee4b9b693
-
SSDEEP
12288:fClBbX5Ty5syL0CR8gotz/S31L/5C9RJl7ICfLcpy:faUxLPigotulL/I9RACfLco
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-